/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/engine/ |
H A D | tb_cipher.c | 76 if(e->ciphers) 79 int num_nids = e->ciphers(e, NULL, &nids, 0); 98 if(e->ciphers) 101 int num_nids = e->ciphers(e, NULL, &nids, 0); 135 return e->ciphers; 141 e->ciphers = f;
|
H A D | eng_cryptodev.c | 132 } ciphers[] = { variable in typeref:struct:__anon7117 214 for (i = 0; ciphers[i].id; i++) 215 if (ciphers[i].id == cipher) 216 return (ciphers[i].ivmax); 231 for (i = 0; ciphers[i].id; i++) 232 if (ciphers[i].id == cipher) 233 return (ciphers[i].keylen == len); 243 for (i = 0; ciphers[i].id; i++) 244 if (ciphers[i].nid == nid) 245 return (ciphers[ [all...] |
H A D | eng_int.h | 160 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/engine/ |
H A D | tb_cipher.c | 78 if (e->ciphers) { 80 int num_nids = e->ciphers(e, NULL, &nids, 0); 99 if (e->ciphers) { 101 int num_nids = e->ciphers(e, NULL, &nids, 0); 135 return e->ciphers; 141 e->ciphers = f;
|
H A D | eng_cryptodev.c | 144 } ciphers[] = { variable in typeref:struct:__anon4475 281 * Find out what ciphers /dev/crypto will let us have a session for. 299 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) { 300 if (ciphers[i].nid == NID_undef) 302 sess.cipher = ciphers[i].id; 303 sess.keylen = ciphers[i].keylen; 307 nids[count++] = ciphers[i].nid; 358 * Find the useable ciphers|digests from dev/crypto - this is the first 360 * can use for ciphers from this engine. We want to return 468 for (i = 0; ciphers[ [all...] |
H A D | eng_int.h | 187 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/engine/ |
H A D | tb_cipher.c | 78 if (e->ciphers) { 80 int num_nids = e->ciphers(e, NULL, &nids, 0); 99 if (e->ciphers) { 101 int num_nids = e->ciphers(e, NULL, &nids, 0); 135 return e->ciphers; 141 e->ciphers = f;
|
H A D | eng_cryptodev.c | 144 } ciphers[] = { variable in typeref:struct:__anon4824 281 * Find out what ciphers /dev/crypto will let us have a session for. 299 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) { 300 if (ciphers[i].nid == NID_undef) 302 sess.cipher = ciphers[i].id; 303 sess.keylen = ciphers[i].keylen; 307 nids[count++] = ciphers[i].nid; 358 * Find the useable ciphers|digests from dev/crypto - this is the first 360 * can use for ciphers from this engine. We want to return 468 for (i = 0; ciphers[ [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | ciphers.c | 1 /* apps/ciphers.c */ 73 "usage: ciphers args\n", 74 " -v - verbose mode, a textual listing of the ciphers in SSLeay\n", 92 char *ciphers=NULL; local 144 ciphers= *argv; 161 if (ciphers != NULL) { 162 if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
|
H A D | progs.pl | 30 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | ciphers.c | 1 /* apps/ciphers.c */ 73 "usage: ciphers args\n", 74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n", 96 char *ciphers = NULL; local 145 ciphers = *argv; 162 if (ciphers != NULL) { 163 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
|
H A D | progs.pl | 34 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | ciphers.c | 1 /* apps/ciphers.c */ 73 "usage: ciphers args\n", 74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n", 96 char *ciphers = NULL; local 145 ciphers = *argv; 162 if (ciphers != NULL) { 163 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
|
H A D | progs.pl | 34 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/ |
H A D | gskit.c | 100 /* Supported ciphers. */ 305 } ciphers[CURL_GSKPROTO_LAST]; local 320 memset((char *) ciphers, 0, sizeof ciphers); 322 ciphers[i].buf = malloc(l); 323 if(!ciphers[i].buf) { 325 free(ciphers[i].buf); 328 ciphers[i].ptr = ciphers[i].buf; 329 *ciphers[ [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/ |
H A D | Makefile.am | 23 --enable-ciphers=arcfour:blowfish:cast5:des:aes:twofish:serpent:rfc2268:seed:camellia
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/ |
H A D | Makefile.am | 23 --enable-ciphers=arcfour:blowfish:cast5:des:aes:twofish:serpent:rfc2268:seed:camellia
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | ssl_polarssl.c | 167 tls_ctx_restrict_ciphers(struct tls_root_ctx *ctx, const char *ciphers) argument 171 int ciphers_len = strlen (ciphers); 176 /* Get number of ciphers */ 178 if (ciphers[i] == ':') 184 /* Parse allowed ciphers, getting IDs */ 186 tmp_ciphers_orig = tmp_ciphers = strdup(ciphers); 844 const int *ciphers = ssl_list_ciphersuites(); local 851 while (*ciphers != 0) 853 printf ("%s\n", ssl_get_ciphersuite_name(*ciphers)); 854 ciphers 863 const int *ciphers = ssl_list_ciphersuites(); local [all...] |
H A D | crypto_polarssl.c | 147 const int *ciphers = cipher_list(); local 150 printf ("The following ciphers and cipher modes are available\n" 158 while (*ciphers != 0) 160 const cipher_info_t *info = cipher_info_from_type(*ciphers); 166 ciphers++;
|
H A D | ssl_backend.h | 134 * Restrict the list of ciphers that can be used within the TLS context. 137 * @param ciphers String containing : delimited cipher names. 139 void tls_ctx_restrict_ciphers(struct tls_root_ctx *ctx, const char *ciphers); 433 * Show the TLS ciphers that are available for us to use in the OpenSSL 439 * The OpenSSL library has a notion of preference in TLS ciphers. Higher
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/ |
H A D | testfipsssl | 14 ciphers="DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:AES256-SHA:EDH-RSA-DES-CBC3-SHA:EDH-DSS-DES-CBC3-SHA:DES-CBC3-SHA:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA:AES128-SHA:EXP1024-DHE-DSS-DES-CBC-SHA:EXP1024-DES-CBC-SHA:EDH-RSA-DES-CBC-SHA:EDH-DSS-DES-CBC-SHA:DES-CBC-SHA:EXP-EDH-RSA-DES-CBC-SHA:EXP-EDH-DSS-DES-CBC-SHA:EXP-DES-CBC-SHA" 16 ssltest="../util/shlib_wrap.sh ./ssltest -F -key $key -cert $cert -c_key $key -c_cert $cert -cipher $ciphers" 41 if ../util/shlib_wrap.sh ../apps/openssl ciphers SSLv2 >/dev/null 2>&1; then
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/test/ |
H A D | testfipsssl | 14 ciphers="DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:AES256-SHA:EDH-RSA-DES-CBC3-SHA:EDH-DSS-DES-CBC3-SHA:DES-CBC3-SHA:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA:AES128-SHA:EXP1024-DHE-DSS-DES-CBC-SHA:EXP1024-DES-CBC-SHA:EDH-RSA-DES-CBC-SHA:EDH-DSS-DES-CBC-SHA:DES-CBC-SHA:EXP-EDH-RSA-DES-CBC-SHA:EXP-EDH-DSS-DES-CBC-SHA:EXP-DES-CBC-SHA" 16 ssltest="../util/shlib_wrap.sh ./ssltest -F -key $key -cert $cert -c_key $key -c_cert $cert -cipher $ciphers" 41 if ../util/shlib_wrap.sh ../apps/openssl ciphers SSLv2 >/dev/null 2>&1; then
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s3_srvr.c | 673 STACK_OF(SSL_CIPHER) *ciphers=NULL; 829 if ((i > 0) && (ssl_bytes_to_cipher_list(s,p,i,&(ciphers)) 843 printf("client sent %d ciphers\n",sk_num(ciphers)); 845 for (i=0; i<sk_SSL_CIPHER_num(ciphers); i++) 847 c=sk_SSL_CIPHER_value(ciphers,i); 850 i,sk_num(ciphers),SSL_CIPHER_get_name(c)); 860 if ((s->options & SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG) && (sk_SSL_CIPHER_num(ciphers) == 1)) 863 s->session->cipher=sk_SSL_CIPHER_value(ciphers, 0); 948 /* Given s->session->ciphers an [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | s3_srvr.c | 914 STACK_OF(SSL_CIPHER) *ciphers = NULL; 1154 if (ssl_bytes_to_cipher_list(s, p, i, &(ciphers)) == NULL) { 1165 fprintf(stderr, "client sent %d ciphers\n", 1166 sk_SSL_CIPHER_num(ciphers)); 1168 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { 1169 c = sk_SSL_CIPHER_value(ciphers, i); 1172 i, sk_SSL_CIPHER_num(ciphers), SSL_CIPHER_get_name(c)); 1185 && (sk_SSL_CIPHER_num(ciphers) == 1)) { 1193 c = sk_SSL_CIPHER_value(ciphers, 0); 1263 &s->session->master_key_length, ciphers, [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | s3_srvr.c | 914 STACK_OF(SSL_CIPHER) *ciphers = NULL; 1154 if (ssl_bytes_to_cipher_list(s, p, i, &(ciphers)) == NULL) { 1165 fprintf(stderr, "client sent %d ciphers\n", 1166 sk_SSL_CIPHER_num(ciphers)); 1168 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { 1169 c = sk_SSL_CIPHER_value(ciphers, i); 1172 i, sk_SSL_CIPHER_num(ciphers), SSL_CIPHER_get_name(c)); 1185 && (sk_SSL_CIPHER_num(ciphers) == 1)) { 1193 c = sk_SSL_CIPHER_value(ciphers, 0); 1263 &s->session->master_key_length, ciphers, [all...] |